A new hacker collective, known as the APT group DONOT, has targeted critical sectors of Pakistan’s economy, specifically the maritime…
Security
A new phishing campaign is targeting e-commerce shoppers in Europe and the United States with bogus pages that mimic legitimate…
Google appears to be readying a new feature called Shielded Email that allows users to create email aliases when signing…
IT leaders know the drill—regulators and cyber insurers demand regular network penetration testing to keep the bad guys out. But…
What do hijacked websites, fake job offers, and sneaky ransomware have in common? They’re proof that cybercriminals are finding smarter,…
As Black Friday approaches, shoppers eagerly anticipate major discounts and deals, hoping to snag a bargain. However, the surge in…
According to research from GitGuardian and CyberArk, 79% of IT decision-makers reported having experienced a secrets leak, up from 75%…
Cybersecurity researchers have shed light on a new stealthy malware loader called BabbleLoader that has been observed in the wild…
An alarming set of chained vulnerabilities in Palo Alto Networks’ PAN-OS software has sparked concerns that attackers could seize administrator…
The United States secured the extradition of a Russian national from South Korea who is allegedly the mastermind behind the…
T-Mobile has confirmed that it was hit during a recent wave of telecom network breaches attributed to a China-linked threat…
A critical player in one of the world’s largest law enforcement sting operations has been sentenced to 63 months in…
A threat actor known as BrazenBamboo has exploited an unresolved security flaw in Fortinet’s FortiClient for Windows to extract VPN…
Palo Alto Networks has released new indicators of compromise (IoCs) a day after the network security vendor confirmed that a…
In an era of escalating digital threats, cybersecurity compliance goes beyond ticking a legal box – it’s a crucial shield…
Artificial intelligence is reshaping the music landscape, turning listeners into creators and sparking new debates over creativity, copyright, and the…
The Iranian threat actor known as TA455 has been observed taking a leaf out of a North Korean hacking group’s…
Microsoft on Tuesday revealed that two security flaws impacting Windows NT LAN Manager (NTLM) and Task Scheduler have come under…
A security analysis of the OvrC cloud platform has uncovered 10 vulnerabilities that could be chained to allow potential attackers…
ESET researchers introduce the Gamaredon APT group, detailing its typical modus operandi, unique victim profile, vast collection of tools and…